IS

Peace, A. Graham

Topic Weight Topic Terms
0.175 model use theory technology intention information attitude acceptance behavioral behavior intentions research understanding systems continuance
0.155 piracy goods digital property intellectual rights protection presence legal consumption music consumers enforcement publisher pirate
0.140 software development product functionality period upgrade sampling examines extent suggests factors considered useful uncertainty previous
0.125 equity conventional punishment justice wisdom focus behavior fairness compliance suggest theory significant certainty misuse reward

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Galletta, Dennis F. 1 Thong, James Y. L. 1
computer ethics 1 deterrence theory 1 expected utility theory 1 software piracy 1
theory of planned behavior 1

Articles (1)

Software Piracy in the Workplace: A Model and Empirical Test. (Journal of Management Information Systems, 2003)
Authors: Abstract:
    Theft of software and other intellectual property has become one of the most visible problems in computing today. This paper details the development and empirical validation of a model of software piracy by individuals in the workplace. The model was developed from the results of prior research into software piracy, and the reference disciplines of the theory of planned behavior, expected utility theory, and deterrence theory. A survey of 201 respondents was used to test the model. The results indicate that individual attitudes, subjective norms, and perceived behavioral control are significant precursors to the intention to illegally copy software. In addition, punishment severity, punishment certainty, and software cost have direct effects on the individual's attitude toward software piracy, whereas punishment certainty has a significant effect on perceived behavioral control. Consequently, strategies to reduce software piracy should focus on these factors. The results add to a growing stream of information systems research into illegal software copying behavior and have significant implications for organizations and industry groups aiming to reduce software piracy.